Method and apparatus for evaluating assets for compliance to a security policy
First Claim
Patent Images
1. A method for evaluating an asset for compliance to a security policy, comprising:
- receiving via a processor a request for evaluating the asset for compliance to the security policy;
performing an evaluation of compliance on the asset to determine compliance of the asset to the security policy, wherein the performing comprises determining whether the asset has deployed the security policy;
recording a result of the evaluation of compliance into a database; and
tracking the asset that has been deemed to be non-compliant to the security policy over a period of time, wherein the tracking comprises;
setting a timer for the asset that has been deemed to be non-compliant to the security policy; and
performing the evaluation of compliance again on the asset that has been deemed to be non-compliant when the timer has expired.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for evaluating one or more assets for compliance to at least one network security policy are disclosed. For example, the method receives a request for evaluating at least one asset for compliance to at least one security policy. The method then performs an evaluation of compliance on the at least one asset to determine compliance of the at least one asset to the at least one security policy. The method then records a result of the evaluation of compliance into a database. Finally, the method tracks the at least one asset that has been deemed to be non-compliant to the at least one security policy over a period of time.
52 Citations
20 Claims
-
1. A method for evaluating an asset for compliance to a security policy, comprising:
-
receiving via a processor a request for evaluating the asset for compliance to the security policy; performing an evaluation of compliance on the asset to determine compliance of the asset to the security policy, wherein the performing comprises determining whether the asset has deployed the security policy; recording a result of the evaluation of compliance into a database; and tracking the asset that has been deemed to be non-compliant to the security policy over a period of time, wherein the tracking comprises; setting a timer for the asset that has been deemed to be non-compliant to the security policy; and performing the evaluation of compliance again on the asset that has been deemed to be non-compliant when the timer has expired. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 19, 20)
-
-
10. A non-transitory computer-readable medium having stored thereon a plurality of instructions, the plurality of instructions including instructions which, when executed by a processor, cause the processor to perform a method for evaluating an asset for compliance to a security policy, comprising:
-
receiving a request for evaluating the asset for compliance to the security policy; performing an evaluation of compliance on the asset to determine compliance of the asset to the security policy, wherein the performing comprises determining whether the asset has deployed the security policy; recording a result of the evaluation of compliance into a database; and tracking the asset that has been deemed to be non-compliant to the security policy over a period of time, wherein the tracking comprises; setting a timer for the asset that has been deemed to be non-compliant to the security policy; and performing the evaluation of compliance again on the asset that has been deemed to be non-compliant when the timer has expired. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus for evaluating an asset for compliance to a security policy, comprising:
a processor configured to; receive a request for evaluating the asset for compliance to the security policy; perform an evaluation of compliance on the asset to determine compliance of the asset to the security policy, wherein the performing means determines whether the asset has deployed the security policy; record a result of the evaluation of compliance into a database; and track the asset that has been deemed to be non-compliant to the security policy over a period of time by setting a timer for the asset that has been deemed to be non-compliant to the security policy, and by performing the evaluation of compliance again on the asset that has been deemed to be non-compliant when the timer has expired.
Specification